Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Beaver, Justin"'
Autor:
Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intell
Externí odkaz:
http://arxiv.org/abs/2308.14835
Autor:
Bridges, Robert A., Oesch, Sean, Verma, Miki E., Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M.
Publikováno v:
Digital Threats: Research and Practice 2023
In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it wort
Externí odkaz:
http://arxiv.org/abs/2012.09214
Autor:
Oesch, Sean, Bridges, Robert, Smith, Jared, Beaver, Justin, Goodall, John, Huffer, Kelly, Miles, Craig, Scofield, Dan
Gartner, a large research and advisory company, anticipates that by 2024 80% of security operation centers (SOCs) will use machine learning (ML) based solutions to enhance their operations. In light of such widespread adoption, it is vital for the re
Externí odkaz:
http://arxiv.org/abs/2012.09013
Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, a
Externí odkaz:
http://arxiv.org/abs/1812.02867
Autor:
Bridges, Robert A., Oesch, Sean, Iannacone, Michael D., Huffer, Kelly M. T., Jewell, Brian, Nichols, Jeff A., Weber, Brian, Verma, Miki E., Scofield, Daniel, Miles, Craig, Plummer, Thomas, Daniell, Mark, Tall, Anne M., Beaver, Justin M., Smith, Jared M.
Publikováno v:
Digital Threats: Research & Practice; Jun2023, Vol. 4 Issue 2, p1-22, 22p
Publikováno v:
2015 IEEE International Conference on Big Data (Big Data); 2015, p807-814, 8p
Autor:
Borges Hink, Raymond C., Beaver, Justin M., Buckner, Mark A., Morris, Tommy, Adhikari, Uttam, Pan, Shengyi
Publikováno v:
2014 7th International Symposium on Resilient Control Systems (ISRCS); 2014, p1-8, 8p
Autor:
Itzkoff, Dave
Publikováno v:
New York Times. 10/2/2010, Vol. 160 Issue 55181, p2. 0p.
Publikováno v:
2013 12th International Conference on Machine Learning & Applications; 2013 Volume 2, p54-59, 6p
Publikováno v:
Computational Science & Its Applications - ICCSA 2012 (9783642311277); 2012, p646-653, 8p